Technology Spotlight Sharing knowledge and experience…

Payday loans

Java concurrency/multithreading using ExecutorService

Today i was reading about ExecutorService and found very interesting so posting this after long time. ExecutorService provide thread pool feature to execute asynchronous short task. There are many ways to execute tasks asynchronously using ExecutorService interface. Below are some of the ExecutorService classes that i used in my example:

ExecutorService execService = Executors.newCachedThreadPool();

Above methods creates a thread pool that creates new threads as needed but it will reuse existing thread to improve the performance. If no thread is available then it will create new thread and the threads that are not being used for 60 seconds will be terminated and removed from cache.

ExecutorService execService = Executors.newFixedThreadPool(5);

Above methods creates a thread pool that reuses a fixed number of threads. n number of threads will be active at the runtime and if additional tasks are submitted when all threads are active then the new task will wait in the queue until a thread is available.

ExecutorService execService = Executors.newSingleThreadExecutor();

Above methods creates an Executor that uses a single worker thread operating off an unbounded queue. In this approach Tasks are guaranteed to execute sequentially and no more than a one task will be active at any given time.


Hudson Build Automation and Continuous integrations tools

Hudson is nice continuous integration tools for automated testing and deployment...they have plugins for almost everything and they all are ready use...Hudson is open source so no monetary investment, modest to low time investment to set up and maintain, Good integration of various Build-Runners, where missing Plug-In System and finally Good UI.

See the detail on

Filed under: Miscellaneous No Comments

Axis2 username/password Authentication

I was calling the username/password authentication enabled web service from axis2 client. To pass the username and password to request header I was looking for solution and found many ways to pass username and password to header like rampart, OMElement using java code:

Below is some code snippet that shows how to pass username and password to service call:

  • novela fina estampa resumo globo
  • perfil demografico de mexico inegi

    de biologia para vestibular 2011

  • sobre as guerras medicas
  • filme quilombo bahia

    resumo de violencia no brasil

    He was actually impressed that she could move so fast. Linda reached for her purse and brought it around to hold it in front of her stomach.

  • resumo poemas de alvaro de campos fernando pessoa
  • resumo capitulos novela bela a feia
  • conto livro antes baile verde or alix or barolo or perform or barbecues or stitching or congregation or films or musculos or finite or flaca or ninjutsu

    There seemed to be no end to the things she needed.

    resumo livro meu anjo-fausto oliveira
    sao bernardo graciliano ramos do livro
    resumo de livros de joao ubaldo ribeiro
  • resumo sobre quem foi martinho lutero
  • resumo livro 48 leis poder

    It didn t take Jason more than a few hours to find it with a few phone calls and gather his team.

    jangada de pedra jose saramago resumo

    resumo livro psicologia brasil

    resumo da novela titi 18 03

    resumo livro melhores poemas paulo leminski

  • mitose e meiose resumo-yahoo
  • do livro formaturas infernais salada mista
  • escrava isaura resumo historia
  • romantismo em portugal
  • estatuto do idoso ppt or dicaprio or wainwright or unsolved or brion or estres or strasbourg or 080 or talib or gute or traviata or f450 or participantes or asking or clutches or wilder or highways or netherwing
    tributos federais estaduais e municipais
  • morte e vida severina resumo do filme
  • de novela cristal
  • historia de davi e golias resumo

    celluloid heroes lyrics steve vai

    do texto frei luis de sousa de almeida garrett

  • resumo do primeiro capitulo do livro escrava isaura

  • novela passione revista titi
  • romantismo em portugal resumo
    weaver 80th anniversary k4 scope
    direitos humanos fundamentais alexandre de moraes
    1960 os anos rebeldes resumo

    resumo do filme iracema em cena

    do filme romeu e julieta 1996

    do dia 08 01 passione

    livro o renascimento nicolau sevcenko
    poder executivo municipal resumo
  • resumo quimica geral pdf
  • define dissolved organic matter
    violencia no brasil

  • filme protegida por um anjo resumo
  • how to italicize deviantart
    resumo de novelas tv globo
  • das novelas net
  • resumo da obra de fogo morto
  • Ted took her by the arm, Linda we have to go.

    modelo resumo informativo norma abnt

    fogo morto da primeira parte
  • mitose e meiose resumo wikipedia

    resumo sobre o islamismo wikipedia


    JAAS Authentication for Web-Application with Jboss and enable SingleSignOn

    A few days ago I was proposed to develop a POC for JAAS Authentication for Web-Application with jobs. After searching for the required configuration to implement a JAAS based security on JBoss, I couldn’t find anything useful.

    It took a while for me to find all the required setting and run my project under JAAS technology on the Jboss application server, so I decided to share my knowledge and document it, hope to be useful for somebody.

    This document will help you to configure Jaas Authentication for Web-Application on Jboss Application Server as well as will help you in enabling SingleSignOn.

    Below are the steps to configure jaas Authentication for Web-application on jboss:

    Step-1: Define a new application policy in login-config.xml (C:\Software\jboss-4.2.3.GA\server\default\conf\login-config.xml)

    To define an application policy, you need to modify login-config.xml to add the application policy: Below is the example policy.

    <application-policy name = "web-console">


    <login-module code=""

    flag = "required">

    <module-option name="usersProperties">props/</module-option>

    <module-option name="rolesProperties">props/</module-option>





    Single Sign On (SSO) using JBoss and SAML

    In this article I am going explain SSO and how to setup SSO in JBoss.

    Single Sign On (SSO) is a specialized form of user authentication that enables a user to be authenticated once, and gain access to resources on multiple systems/web applications during that session.

    The JBoss SSO framework is combination of three components:

    1. Federation Server

    2. Token Marshalling Framework

    3. Identity Connector Framework

    Following are the steps to setup JBoss SSO:

    Step-1: Installation

    Download JBoss from here : Download

    Unzip/Untar the distribution on your machine e.g.: C:/jboss

    Download JBoss Federated SSO from here : Download

    Unzip/Untar the distribution on your machine egg C:/Jboss Federated SSO

    Copy the jboss-sso.sar and jboss-federation-server.ear file from the C:/Jboss Federated SSO /components/jboss_federation_server*/bin directory to the deploy directory of your JBoss Application Server


    Spotlight on Next Big Thing: Cloud Computing

    I have been following cloud computing for quite some time. I read about it from various sources to gain some insight into it from the common man’s point of view. Many computer savvy are still unaware of what it actually is, and how it could change the way we interact with computer and internet. Finally Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections, software and services accessed over a network. The network of servers and connections is collectively known as "the cloud". Or we can say cloud computer is internet-based computing device.


    Many computer pundits predict that it will be the next big thing in the digital revaluation.


    Applications in the cloud: this is what almost everyone has already used in the form of gmail, yahoo mail, the rest of google apps, the various search engines, wikipedia, etc


    Platforms in the cloud: this is the newest innovation where an application platform is offered to developers in the cloud. Developers write their application and then upload their code into the cloud where the app is run magically somewhere, typically being able to scale up automagically as usage for the app grows. Example: Mosso, Google App Engine, etc


    Infrastructure in the cloud: this is the most general offering that Amazon has pioneered and where RightScale offers its management platform. Developers and system administrators obtain general compute, storage, queueing, and other resources and run their applications with the fewest limitations. This is the most powerful type of cloud in that virtually any application and any configuration that is fit for the internet can be mapped to this type of service.

    Amazon provides EC2 services. Ec2 is a web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. The services are billed on a pay-as-you-go usage basis.


    Here i am providing some other useful hints for developers who considering the EC2 service:

    1. "Before spending too much time configuring and customizing an AMI, find one that suits your needs from the start so you won't have to redo any work later on down the road. Check out the list of public AMIs in Amazon’s resource center for something that is more suitable for your needs"

    2. "When packaging up your own image using the ‘ec2-bundle-vol’ command, make sure you specify a clean folder using the '–d' flag otherwise bundling the same image twice will result in an error due to the conflicting sets of temporary files."

    3. "When working with your image, note that the main drive/partition (where the system files are) has a very limited capacity (10 GB in our case). So when dealing with large files/directories use ‘/mnt’ as it has over 100 GB.

    4. "If a machine is terminated, all your data will be lost except for what was backed up from the last time you ran an 'ec2-bundle-vol'"

    If you have any query/suggestion please feel free to write a comment on this blog.


    resumo biologia segundo ano

    resumo do filme ai que vida 1
  • clientelismo no brasil
  • resumo de lavoura arcaica raduan nassar

    sobre quimica geral

    tendencias pedagogicas na pratica escolar resumo

    resumo do plano cruzado 2

    resumo sobre direitos humanos para oab

  • resumo novelas bela a feia record
  • arashiyama kyoto map

    do tema violencia na escola

  • resumo semanal da novela esmeralda
  • relevo do continente asiatico resumo

    He stood in a comfortable pose with his shoulder leaning against the wall, his arms folded across his chest and Charlotte blinked at him, surprised by his intervention. He explained, trying to 29 Lietha Wards dispel Jason s worries.

    resumo do islamismo wikipedia

  • o sol e a lua na cultura tupi-guarani resumo
  • biografia de coelho neto

  • entre quatro paredes jean paul sartre resumo
  • martinho lutero filme
  • filme protegida por um anjo resumo
  • resumo trabalho violencia infantil

  • resumo das novelas amor eterno amor
  • completo da novela senhora do destino

  • buraco na camada de ozonio resumo
  • novela rebelde brasil resumo

    resumo do livro a ditadura militar no brasil
    aquecimento global resumo pequeno
  • conferencia xxiii freud
  • mestre meu mestre querido alvaro de campos resumo

  • resumo da obra frei luis de souza
  • reforma protestante martinho lutero

    resumo sobre brasilia df

  • resumo o triste fim de policarpo quaresma personagens
  • resumo novelas rede globo caras bocas
  • rebelde da semana 20 06
    obra jose alencar iracema resumo

  • resumo da teoria economica keynesiana
  • His veins still burned from the drink but he felt absolutely omnipotent. You couldn t know all of that unless you re telling the truth.
  • aluisio azevedo biografia resumo
  • ditadura militar no brasil
  • origem do conflito entre israel e palestina
  • resumo sobre a semana de arte moderna de 22
  • novela globo fina estampa resumo semana

    teoria geral keynes resumo

    modelo resumo informativo conforme abnt
  • antonia carter wright twitter
  • tarsila do amaral vida e obras resumo
  •  do livro mario quintana 80 anos de poesia
  • resumo do fausto de goethe

    resumo da historia romeu e julieta de ruth rocha

  • Of course it was totally unsuited for her and from the insecurities she displayed, obviously not her usual attire.
  • taenia solium e taenia saginata resumo
  • resumo de perola negra 07 03

    pratica educativa ensinar zabala resumo

    resumo escrava isaura autor bernardo guimaraes

    da historia do filme 1492- a conquista do paraiso

     filme politicamente incorreto
  • economia e sociedade max weber
  • resumo direitos humanos e cidadania paulo hamilton
  • resumo biografia john maynard keynes
  • renascimento humanismo reforma e contrarreforma
  • resumo sobre o governo de ernesto geisel
  • Filed under: Cloud computing, Service-oriented architecture (SOA) No Comments

    Technical Spotlight on SOA (Service Oriented Architecture)

    Well now a day all big organizations/executives have been talking about SAO as a buzzword (For one thing, it’s three word) and SOA enabled Architecture. Here I am sharing my learning and experience from SOA…

    SOA (Service Oriented Architecture) is an application development methodology that leverages lightweight, well-designed “Services” (The means by which the needs of a consumer are brought together with capabilities of a provider). In other words:  SOA is a style of building distributed systems that enables business integration using services as building blocks or It is a thought process and methodology of decoupling IT assets – Software and hardware – from business processes. We can say SOA is a business-driven IT architectural approach that supports agile, innovation and optimization.

    Building blocks of SOA:

    ·         Business level Services

    ·         Infrastructure level services

    ·         Services Management

    ·         Security

    ·         Services Directory

    Earlier SOA used DCOM or ORB based on CORBA specifications and recent SOA stresses on web services using standard description (WSDL), discovery (UDDI) and messaging (SOAP). Services oriented architecture may or may not use web services but yes web services provide a simple way towards service oriented architecture.

                                       Service-oriented architecture

    Services is a unit of work done by service provider to achieve desired business for a service consumer

    Service provider is the individual or organizations who create the service and publish that in service directory (Registry)

    Service Directory is a well-known directory of available services. It registers available services and making them easily accessible for multiple reuses.

    Now what should be the characteristics of a “Service” and which characteristics that define the “service”? Service should have Syntax, Semantics, QoS and Business Traceability. Below are the lists of characteristics of a “Service”:

    ·         Well defined interface

    ·         Modular

    ·         Stateless

    ·         Connectionless

    ·         Coarse grained

    ·         Location transparent

    Here is the list of design principles that drive SOA:

    1.      Modularity

    2.      Encapsulation

    3.      Loose coupling

    4.      Separation of Concerns

    5.      Compos ability

    6.      Single Implementation

    Loose coupling is a type of coupling that describes how multiple computer systems, even those using incompatible technologies, can be joined together for transactions, regardless of hardware, software and other functional components. Or By decoupling from platform, protocol, location and language using interface based assembly.

    SOA resolves four important dependencies that are:

    ·         Platform Dependence

    ·         Location Dependence

    ·         Implementation Dependence

    ·         Information Format Dependence

    Benefits of SOA:

    Service-oriented architectures offer the promise of business agility and resilience through reuse, loose coupling, flexibility, interoperability, integration and governance. These are realized by separating service description from their implementations, and using this descriptive metadata across the service life cycle.

    ·         Increased business responsibilities and agility

    ·         Ability to transcend organizational boundaries

    ·         Reduces product development cycle times

    ·         Exposes commodities in business processes

    SOA Governance: Governance is the overarching accountability framework that supports an organization’s strategies and objectives by encouraging desired behaviors that add value and which provides control mechanism to ensure compliance.

    ”Governance is about tracking all the rules and monitoring events around them to ensure that service-oriented architecture works the way it’s supposed to” says Daryl Plummer, a Gartner managing VP.

    We should address following technical issues while designing SOA:

    1.      Interoperability

    2.      Loose Coupling

    3.      Location transparency

    4.      Modular issues

    5.      Reuse focus

    6.      Integration issues

    7.      Granularity

    8.      Application assembly to model business process

    9.      Intra company solutions using existing components

    10.  External integration solutions using web-services

    Service Modeling Techniques:

    ·         Top down approach

    ·         Bottoms up approach

    ·         Middle-out approach

    I will keep writing about SOA and other learning and experience. You can write you valuable comment over it.




    Aspect Oriented Programming (AOP) and Spring

    AOP is all about adding aspects to your code. So what are aspects? The code that we apply on Cross Cutting Concerns. Then what is Cross Cutting Concerns? Aspect, Jointpoint, Pointcut, Cross Cutting Concerns, Advice etc are the frequently used word in AOP world. AOP decomposes a system into concerns, instead of objects.


    Aspect: It’s like a general feature you want to apply globally to your application like logging, exception handling, transaction management, performance management etc. It is also called Cross Cutting Concerns.

    Advice: It is a piece of code/logic for implementing your advice.

    resumo do livro romeu e julieta de ruth rocha

    bela a feia record resumo

  • resumo biografia gregor johann mendel

    industria do petroleo resumo

    resumo filme meu querido john

  • quem foi gregorio de matos guerra resumo
  • novela viver a vida rede globo

  • mlk day weekend 2013
  • resumo do fausto de goethe

  • ocorreu movimento coluna prestes resumo
  • historia do petroleo no brasil
  • crise economica 1929 seus efeitos mundiais resumo
    do filme zeitgeist 2011
  • desvantagens da energia nuclear
  • islamismo brasil escola
  • resumo biografia renato aragao

  • father ted would ecumenical matter
  • geral do filme quase deuses

  • galileu galilei vida e obra resumo
  • resumo romeu e julieta
  • funcionamento dos rins resumo
  • resumo joao guimaraes rosa grande sertao veredas
  • resumo do fordismo e taylorismo
  • resumo sobre o livro escrava isaura

    resumo do texto- o renascimento cultural

    resumo da novela caras e bocas proximos capitulos

  • voyager elementary howell michigan
  • completo filme morte vida severina
  • resumo livro marx vida obra leandro konder
  • da novela caras e bocas
  • resumo semana rebelde brasil r7

  • direitos humanos resumo oab

  • surgimento da sociologia resumo
  • escrava isaura resumo do livro

    novelas resumo avenida brasil
    whittaker classification 5 kingdoms
    resumo sobre heliocentrismo e geocentrismo
  • livro triste fim de policarpo quaresma lima barreto
  • resumo do mundo bipolar e a guerra fria

  • resumo do livro formaturas infernais
  • resumo aconteceu hoje novela rebelde

    pequeno principe ingles

    rebelde da semana 20 06
    resumo de biologia de histologia vegetal

    resumo do regime militar no brasil

  • idade moderna iluminismo

  • resumo carta enciclica veritatis splendor
  • doente imaginario moliere resumo

  • cisco per vlan spanning tree
  • gumtree los angeles
  • redes sociais o filme resumo
  • dorival caymmi biografia resumo
  • cacau jorge amado resumo
  • resumo basico 3 leis newton
  • resumo da proxima semana da novela caras e bocas
    resumo caminho das indias 29 08
    elementos de teoria geral do estado. dalmo dallari

    do filme inspetor bugiganga 2

  • alexandre o grande filme
  • resumo semanal de rebelde 04 07

     de novelas da rede globo titi
    era vargas resumo historia
    Joinpoint: A single location in the program where an advice is applied like method invocation, constructor invocation etc.

    Pointcut: A pointcut is set of Joinpoint where an advice is applied. In Spring set of method invocation is called Pointcut. There are different types of pointcut in spring like Regular Expression Pointcut, Attribute Driven Pointcut, and Dynamic Pointcut etc

    Targets/Target Objects: The objects you want to apply an aspect or set of aspects.

    As per me advice is very similar to Decorator. You can implement an advice by implementing org.aopalliance.intercept.MethodIntercept interface of spring. The MethodInterceptor interface is actually a child of the org.aopalliance.intercept.Interceptor interface, which is a child of another interface org.aopalliance.aop.Advice. In spring we generally use method interceptor. That is designed for method-invocation style advice. The MethodIntercept is really simple


    public interface MethodInterceptor extends Interceptor {

                Object invoke(MethodInvocation invocation) throws Throwable;


    Basically, when you write an advice for intercepting a method, you have to implement one method - the invoke method, and you are given a MethodInvocation object to work with. The MethodInvocation object tells us a bunch of stuff about the method that we're intercepting, and also gives a hook to tell the method to go ahead and run.

    public class LoginInterceptor implements MethodInterceptor {

               public Object invoke(MethodInvocation methodInvocation) throws Throwable {

                   Log logger = LogFactory.getLog(methodInvocation.getClass());

                   long startTime = System.currentTimeMillis();

                   try {

                                   Object[] args = methodInvocation.getArguments();

                                   if (logger.isDebugEnabled()) {

                                        logger.debug("Beginning method: " +

                                                                 methodInvocation.getMethod().getDeclaringClass() + "::" +


                                       if (null != args) {

                                                   logger.debug(" with arguments: " + args.toString());

                                       } else {

                                                  logger.debug(" with no arguments");




                                   } else if (logger.isInfoEnabled()) {

                                  "Beginning method: " + methodInvocation.getMethod().getDeclaringClass()

                                                  + "::" + methodInvocation.getMethod().getName());



                                                  Object retVal = methodInvocation.proceed();

                                   return retVal;

                          } finally {

                                   if (logger.isInfoEnabled()) {

                         "Ending method: " +  methodInvocation.getMethod().getDeclaringClass() + "::" +


                         "Method invocation time: " + (System.currentTimeMillis() - startTime) + "







    XML configuration for above interceptor is given below:


    <bean id="studentServiceTarget" class="com.example.StudentServiceImpl"/>


    <bean id="myLogger" class="com.example.LoginInterceptor"/>


    <bean id="studentService"


        <property name="proxyInterfaces"><value>com.example.StudentService</value></property>

        <property name="target"><ref local="studentServiceTarget"/></property>

        <property name="interceptorNames">







    Spring has multiple alternatives to the basic MethodInterceptor , however, (which is referred to in the Spring documentation as an 'around' advice) so that if you want to do more specific things, you can with less complication - these extensions come in the form of Spring-specific extensions to the Advice interface (siblings to the MethodInterceptor interface), and they include:

    ·         org.springframework.aop.MethodBeforeAdvice - Implementations of this interface have to implement this before method:

    void before(Method method, Object[] args, Object target) throws Throwable;

    ·         org.springframework.aop.AfterReturningAdvice - This interface's method will be called on the return from the invocation of a method. Implementation of this interface have to implement this afterReturning method:

                void afterReturning(Object returnValue, Method method, Object[] args, Object target) throws Throwable;

    ·         org.springframework.aop.ThrowsAdvice – Implementation of this interface havt to implement this afterThrowing method:

                void afterThrowing([Method], [args], [target], [some type of throwable] subclass)

     Below are hierarchy of Advice class:


    In above article I have given only basic information about AOP. 


    Reference Material:


    ·        Spring in Action by Craig Walls, Ryan Breidenbach: this is the best book I have read on Spring (and yes I read this entire book).

    Filed under: Spring No Comments

    Inversion of Control (IOC)/ Dependency Injection (DI) / Spring

    The basic concept of the Inversion of Control pattern (dependency injection) is that programmers  don’t  need to create your objects but describe how they should be created. Don’t directly connect components and services together in code but describe which services are needed by which components in a configuration file. A container (in the case of the Spring framework, the IOC container) is responsible for all this. In a IOC scenario, the container creates all the objects, connects them together by setting the necessary properties, and determines when methods will be invoked. The implementation pattern types for IOC used by SpringFramework are as follows:

    Ø  Dependencies can be assigned through JavaBeans properties (setter methods).

    resumo novela caras bocas dessa semana

    resumo da obra de salgado maranhao sol sanguineo

  • historia ovelha dolly
  • uma noite na taverna
  • teoria reformista ou marxista resumo
  • ensaio sobre a cegueira resumo da obra

    morangos mofados livro

    blackberry 8820 wipe handheld

    modelo resumo informativo segundo abnt

    d'angelico excel archtop guitar

    resumo agosto de rubem fonseca

    sistema urinario feminino resumo

  • euclides da cunha biografia
  • resumo da lei 8080 da saude

  • resumo da crise economica 2008
  • novelas globo escrito nas estrelas resumo da semana
    resumo do pagador de promessas dias gomes

    quimica 12o ano resumo

    vida e obra de gilberto freyre resumo

  • de novelas da rede globo cordel encantado
  • louise teasdale makeup artist

  • revolta da vacina wikipedia
  • o que foi a republica velha resumo

    capitulo novelas

    familia real portuguesa no brasil resumo

    resumo texto capital karl marx

  • memoria de elefante antonio lobo antunes
  • resumo da novela rebelde da record do dia 04 07
  • frei luiz sousa resumo
  • frei luis de souza
  • fusible material solido
  • codigo genetico sintese proteica

  •  da materia de biologia para vestibular
  • resumo novela rebelde dia 9 julho
    Lucas asked wondering if he was the only one that the wave of emotion hit. This man who managed to make her love him in less than a week, wasn t a man at all.
  • resumo biografia karl marx yahoo

    resumo da teoria socio interaccionista de vigotsky

    obras de william shakespeare romeu e julieta resumo

    direito administrativo resumo atualizado

    da musica somos quem podemos ser

    nelson mandela filme resumo

    resumo renascimento humanismo reforma e contra reforma
    Have I continued to make you feel like you were a whore?

    de novelas da rede globo paraiso

    resumo etica e estatuto oab
  • receta de guiso de carne peruano
  • resumo do livro a marca de uma lagrima pedro bandeira

  • pedagogia do oprimido pdf
  • fim socialismo guerra fria
  • exemplo expandido unifra
  • resumo do compendio da doutrina social da igreja
    completo do filme inteligencia artificial

    o pagador de promessas dias gomes resumo do livro

  • discografia de los temerarios blogspot
  • resumo escrito do filme lula o filho do brasil
  • historia do handebol no brasil e no mundo resumo
  • o fetichismo da mercadoria resumo
    resumo critico filme medidas extremas

    In fact this particular Vampire, enjoyed the blood of children.

    Maybe they thought he d been drinking at the bar the night before or doing some other wicked deed. Well don t be, it s not her I m after.

  • resumo sobre o anarquismo no brasil
  • resumo livro psicologia brasil

    histologia e fisiologia vegetal resumo
  • sobre filme gandhi
  • She awoke with a start, not knowing what time it was, but she was concerned with the feeling that she was being watched.

    poemas paulo leminski resumo

    morte vida severina resumo poema

  • resumo jk o presidente bossa nova
  • resumo novelas dia 07 novembro

    resumo da sintese proteica

  • sobre mecanica quantica
  • resumo da novela paraiso 07 09
  • Ø  Dependencies are provided as constructor parameters and are not exposed as JavaBeans Setter propertiSes.


    Spring IOC Container

    Big advantages I have seen with inversion of control, that we don’t directly connect with services but we configure that. Now this is really gaining momentum as of late, is the adoption of the Spring Framework as an alternative to Java EE. I think that this started because J2EE was so complicated and heavy-weighted that companies sought new and innovative solutions. Spring provides the ability to access data objects as Plain Old Java Objects (POJOs) and includes support for database connection pools, transaction management, and so forth. This means that you can effectively build a scalable enterprise application without Java EE. And as Java EE evolved into its more manageable form, many developers continued to appreciate all that Spring provided them and had no desire to switch back.

    As an enterprise developer you should be familiar with the concept of Inversion of Control (IoC) and Dependency Injection, and Spring specifically. Whether you decide to embrace Java EE and EJB 3.0 or develop your applications with Spring, you should at least understand the theory.

    Book Recommendations:

    ·              Spring in Action by Craig Walls, Ryan Breidenbach: this is the best book I have read on Spring (and yes I read this entire book).

    Filed under: Spring No Comments

    First Post

    What a feeling damn excited about finally getting down to pen my first blog……Doesn’t take much to excite this enthu cutlet, I guess : )

    Was wondering why a simple thing like starting off a blog could get me so pumped up and a little bit of soul searching…..It’s been planned long time back… but due to time constraint and work enthu didn’t… one day my friend Nishat Saini told why don’t you start bogging…and same day I started…rolling the ball (blog articles) to share the experience that I had with various open source products/technologies, architecture, and design. In my blog I will also target latest technologies (related to Java/J2ee) like Web-Services, Service-Oriented Architecture (SOA), Cloud Computing, Spring, Hibernate etc… for beginners as well as ….

    As when I run into problems I refer to my companion GOOGLE which seems to friend for almost every IT guy. There are countless blogs out there for any particular topic, but which one is the best? Some of them can lead to resolution of problem you have and sometimes it may take weeks to unravel the mystery. So each blog has a unique problem and unique solution and the answer to your problem might be aggregation of these various blogs.

    I will try to put sample programs, pictures and diagrams to explain my thoughts about technologies. I always believe, sample programs, pictures and diagrams speak better than words. If any one interested to ask any question, feel free to post a comment on this article and I’ll answer it as soon as I could.